Section 13 Activities
Activity 1 Complete the following table with possible reasons why ICT security might be compromised Security BreachPossible reason Unauthorised access to data Impersonating another user Changing functionality of software Link into someone else’s communication link Claim to have either sent data or indeed not sent
Activity cont. Describe 2 internal and 2 external threats to the ICT system Describe some of the reasons why individuals or organisations might try to breach security of ICT systems Name 2 type of threat to ICT systems Describe a means of protecting data that is being transferred over a network
Activity cont. If the security measures put in place fail to keep external threats at bay, what legislation is in place to prosecute offenders? Describe the measures put in place by the Data Protection Act and describe the effectiveness of the legislation.